Abstract
With the increase in use of a technology, its misuse possibility also increases in general. Moreover, there are instances where new technologies are implemented without thoroughly testing for vulnerabilities. We consider RFID, a disruptive technology, and related vulnerabilities in existing supply chain applications from an ethics perspective. We develop an extended ethics model to incorporate the effects of emerging information and communication technologies, specifically that of RFID systems, including technology selection, social consequences, and practitioners’ rationality. We introduce a set of matrices for technology regulation development based on this model to serve as a communication tool for the policy maker for policy design regulation. We use the case of RFID to illustrate the model and matrices.
Similar content being viewed by others
References
Bommer, M., Gratto, C., Gravander, J., & Tuttle, M. (1987). A behavioral model of ethical and unethical decision making. Journal of Business Ethics, 6, 265–280.
Boynton, A. C., Zmud, R. W., & Jacobs, G. (1994). The influence of IT management practice on IT use in large organizations. MIS Quarterly, 18(3), 299–318.
Calluzzo, V. J., & Cante, C. J. (2004). Ethics in information technology and software use. Journal of Business Ethics, 51(3), 301–312.
Clarke, R. V. (1983). Situational crime prevention: Its theoretical basis and practical scope. Crime and Justice, 4, 225–256.
Clarke, R. V. (1995). Situational crime prevention. Crime and Justice, 19, 91–150.
De George, R. T. (2000). Business ethics and the challenge of the information age. Business Ethics Quarterly, 10(1), 63–72.
Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issues. Journal of Public Policy & Marketing, 12(1), 106–119.
Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. The Academy of Management Review, 16(2), 366–395.
Kaler, J. (1999). What’s the good of ethical theory? Business Ethics: A European Review, 8(4), 206–213.
Khazanchi, D. (1995). Unethical behavior in information systems: The gender factor. Journal of Business Ethics, 14(9), 741–749.
Laudon, K. C. (1995). Ethical concepts and information technology. Communications of The ACM, 38(12), 33–39.
Lee, H., Padmanabhan, P., & Whang, S. (1997). Information distortion in a supply chain. Management Science, 43(4), 546–558.
Levi, M. (1988). The prevention of fraud. Crime Prevention Unit Paper 17, London: Home Office.
Mitrokotsa, A., Rieback, M. R., & Tanenbaum, A. S. (2010). Classifying RFID attacks and defenses. Information Systems Frontier, 12, 491–505.
Moir, L. (2001). What do we mean by corporate social responsibility? Corporate Governance, 1(2), 16–22.
Murphy, P. E. (1988). Implementing business ethics. Journal of Business Ethics, 7(12), 907–915.
Nolan, R., & McFarlan, F. W. (2005). Information technology and the board of directors. Harvard Business Review, 83(10), 96–106.
Payne, D., & Dimanche, F. (1996). Towards a code of conduct for the tourism industry: An ethics model. Journal of Business Ethical Standards, 15(9), 997–1007.
Trevino, L. K. (1986). Ethical decision making in organizations: A person–situation interactionist model. The Academy of Management Review, 11(3), 601–617.
Weaver, G. R. (1993). Corporate codes of ethics: Purpose, process and content issues. Business and Society, 32, 44–58.
Welsh, B. C., & Farrington, D. P. (2000). Costs and benefits of crime prevention programs. Crime and Justice, 27, 305–361.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhou, W., Piramuthu, S. Technology Regulation Policy for Business Ethics: An Example of RFID in Supply Chain Management. J Bus Ethics 116, 327–340 (2013). https://doi.org/10.1007/s10551-012-1474-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-012-1474-4